The lead files

نویسنده

  • Claire Panosian Dunavan
چکیده

17 Claire Panosian Dunavan, emeritus professor of Medicine, University of California, Los Angeles, School of Medicine, is a co-founder of UCLA’s Program in Global Health and a medical writer who frequently contributes to the Los Angeles Times, Scientific American, and Discover magazine. Sherman Mellinkoff (AΩA, Stanford University, 1944), emeritus professor of Medicine and emeritus dean of the University of California, Los Angeles, School of Medicine, is a member of the editorial board of The Pharos and a past contributor to the journal.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Information Curators in an Enterprise File-Sharing Service

We report on a social-software file-sharing service within a large company. User-created collections of files were associated with increased usage of the uploaded files, especially the sharing of files from one employee to another. Employees innovated in the use of the collections features as “information curators,” an emergent lead-user role in which one employee creates named, described colle...

متن کامل

File Replication Method Based on Demand Forecasting of File Download in P2P Networks

AbstrAct: In peer-to-peer (P2P) networks that support file-sharing services, the level of access demand can vary widely between different files. Since fewer nodes store files for which there is a lower demand, these files are more likely to be lost from the P2P networks if users leave the network or delete the files. File loss can cause users to seek alternatives to P2P services, and lead to de...

متن کامل

Verification of Recovered Digital Evidence on the Amazon Kindle

The Amazon Kindle is a popular e-book reader. This popularity will lead criminals to use the Kindle as an accessory to their crime. Very few Kindle publications in the digital forensics domain exist at the time of this writing. Various blogs on the Internet currently provide some of the foundation for Kindle forensics. For this research each fifth generation Kindle was populated with various ty...

متن کامل

A Mutli-Agent System for Firewall Forensics Analysis

Computer Forensics applies law to fight against unlawful and illegitimate use of computers and networks. It employs investigation methods to solve computer crimes. Knowing that the firewall is the unique input and output in a network, it is considered as the ideal location for recording network activities. The firewall log files trace all incoming and outgoing events in a network. Its content c...

متن کامل

A survey of security visualization for computer network logs

Network security is an important area in computer science. Although great efforts have already been made regarding security problems, networks are still threatened by all kinds of potential attacks, which may lead to huge damage and loss. Log files are main sources for security analysis. However, log files are not user friendly. It is laborious work to obtain useful information from log files. ...

متن کامل

Do NiTi instruments show defects before separation? Defects caused by torsional fatigue in hand and rotary nickel-titanium (NiTi) instruments which lead to failure during clinical use.

AIMS Visual and microscopic evaluation of defects caused by torsional fatigue in hand and rotary nickel titanium (NiTi) instruments. MATERIALS AND METHODS Ninety-six NiTi greater taper instruments which were routinely used for root canal treatment only in anterior teeth were selected for the study. The files taken include ProTaper for hand use, ProTaper Rotary files and Endowave rotary files....

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2007